Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Never heard of it (Score 1) 164

The best software does its job quietly and doesn't need a bunch of attention from the user, allowing you to do your actual work. Something that seems to be lost on the makers of many other software projects, OSS and commercial.

Really? Seems to me Microsoft does a wonderful job, considering how many of their users don't know a thing about their computer.

Comment Re:the rules changed, that's why the manual contro (Score 1) 90

The situation they require manual controls for is when you drive into a blizzard/flood, and the car drives until it's unsafe to stop and unsafe to continue.

I can imagine that going over so well with consumers "Hi! It's me, your autonomous car here. You know how I drove you up in the mountains and to this mountain pass? Well now there's a blizzard coming so I quit. Now I know you haven't touched the wheel in a month because I've been doing your commute and I wouldn't drive under these conditions, but you'll probably freeze to death if you don't get down so... best of luck? Toodeloo."

Comment Hahahahahahahahaha LOL (Score 2) 441

Seriously, he's going to die like the rest of us. I've seen how far we've come in medicine and I see how far we haven't gotten yet. The body starts failing one way then another way and it just keeps piling up as you get 70-90 years old. Cancer is just one of many, many things that are likely to kill you before you're 120.

Comment Re:LOL ... w00t? (Score 1) 292

The screen readers for the blind emit nonsense words when fed typographically incorrect input. Be glad you're not blind, and don't have to deal with them.

And that character on your keyboard, above the equals sign? It's the right one to use, but the author didn't use it. Instead, he made 100 typos using the wrong symbol.

Comment Re:LOL ... w00t? (Score 2) 292

What's news then, is that Amazon can't deploy a simple perl script to fix common typography errors such as these.

There is nothing simple about typography, and a script such as you describe would cause more damage than it would fix. Any editor has to fully understand English, to know which word is the right choice, to understand syntax and grammar, and to know when a writer is deliberately or playfully bending the rules.

If you want to see what the state of the art in automated editing looks like, try using Word's grammar checker. If all of its advice is followed, it can make any interesting story read as blandly as an 8th grader's essay paper on the history of frogs.

Comment Re:Security at FRA (Score 2) 91

It's actually very common here in Europe, it's a public service but the government issues some form of tender to buy it from the private sector. And yes, they do often suck at writing the contract and following up that what's been ordered is delivered in correct quality and quantity. If you ask for "a security guard" you get a body with a pulse, if you ask them to have mandatory training, pass certifications and exams you'll get that, but if you don't ask you don't get it even if they're totally unfit for the job. The ones you're buying from is in the business of making money, they'll cut corners if the contract permits them to. And you got issues with continuity and such, but people complain about public departments full of public employees that have a more or less permanent monopoly on what they're doing too. It's easy to get complacent at all levels when you can just say "it takes what it takes" and get funded next year too.

Comment Re:In other news: (Score 4, Insightful) 91

There are ~30 million commercial flights and around 2 hijackings per year, so that nobody's tried at Frankfurt might be just statistics. None of the confirmed hijackings since 2001 has casualties, though I suppose there's mysteries like MH370. Even if you assume the worst though, statistically you're far more likely to die from technical malfunction or pilot error. Or external causes like being shot down by a missile like MH17, but I guess that's location dependent. Unless you can bring a bomb on board to take down the plane yourself there's no way people will let you cease control of the craft anymore, so hijacking as we knew it is a past era. Most of it is just preventing a stabbing that could just as well have happened on the bus or tram or subway, it just happens to be up on a plane.

Comment Re: I don't care about NASA (Score 2) 156

At this point they are the best way to send cargo to the ISS and in a few year will be the best way to send astronauts in LEO, but if they want to go any further they're going to need a new rocket (stronger than the Falcon 9 heavy).

Uh, you do realize the Falcon Heavy has a payload of 13200 kg to Mars and will be more powerful than any current operational rocket?

NASA as the actual plan for their SLS while SpaceX only has ideas for now.

They have a great plan, but they don't have the money. The Falcon Heavy is funded and should be operational in the first half of next year while NASA is years away from a date that's probably slipping. And I'm not sure why you're saying SpaceX is the one on the drawing board, the boosters are essentially "headless" Falcon 9s while the SLS is a new design. Sure, when or if the SLS flies it'll be in a class of its own we haven't seen since the Saturn V. I wouldn't hold my breath though, while the Falcon Heavy seems very likely that will happen.

Comment Re: What took them so long? (Score 1) 212

For your simplified example, it is probably cheaper -- and just as secure -- to have an operator enter the dozen or so keystrokes to order "produce x amount of class y steel" than to design, build, install and support a more automated method. Human involvement has the added bonus of (nominally) intelligent oversight of the intended behavior for the day.

Do you have any idea what the error rate for manual data entry is? Typically about 0.5% of the entries will be wrong. Retyping information is a very error prone process.

Comment Re:TOR is a fucking honey pot ! (Score 4, Insightful) 86

You do realize that most "darknets" are built on a "bust one, bust all" model? Pretty much the only security is that the bad guys aren't in your darknet, they've never reached a popularity where there's any plausible deniability. The only other people likely to be in your darknet are the other members of your terrorist cell or whatever you're part of, it has never offered anything for "normal people" for you to hide in. And darknets have actually been used as honeypots, to make clueless people give away their IP to join a private group which turns out to be a sting. It is pretty much the exact opposite of anonymity, it's joining a conspiracy and you're at the mercy of the stupidity of everyone in it.

TOR is trying for something entirely different, which is to keep everyone at arm's length from each other. I talk to you over TOR, you get busted well tough shit they still can't find me. The users don't know the server, the server doesn't know the users. Of course by adding that glue in between you run the risk of the man in the middle working out who both ends of the connection are, but that's the trade-off. TOR is trying to do something extremely hard, it tries to offer low latency - easy to make timing attacks, arbitrary data sizes - easy to make traffic correlation attacks and interactive access - easy to manipulate services into giving responses, accessible to everyone and presumably with poison nodes in the mix. It's trying to do something so hard that you should probably assume it's not possible, not because they have any special inside access.

I actually did look at trying to do better, it was not entirely unlike Freenet done smarter only with onion routing instead of relying on statistical noise. It wouldn't try to be interactive so you could use mixmaster-style systems to avoid timing attacks and (semi-)fixed data block sizes to avoid many correlation attempts but I never felt I got the bad node issue solved well. TOR picks guard nodes, but it only makes you bet on a few horses instead of many. It was still too easy to isolate one node from the rest of the network and have it only talk to bad nodes, at which point any tricks you can play is moot because they see all your traffic. Even a small fraction of the nodes could do that on a catch-and-release basis and I never found any good countermeasures.

Comment Re:One number to breach them all (Score 4, Informative) 97

I can only think the reason it hasn't been fixed is because fraud makes the banks money and they love seeing stories like this.

Well, you would be very wrong. Fraud costs both the retailers and the banks money. The real problem is that issuing new chip cards would cost the banks more than the fraud. Not only are the cards about a dollar more expensive each, and they still have to be re-issued about every three years, but the systems that inject encrypted keys into them, and store the keys on their databases, are very expensive. Banks are notoriously cheap when it comes to spending money that won't make them money.

The other reason EMV hasn't rolled out across the U.S. is that millions of retailers have about 12 million old credit card terminals spread across the country, and most are owned by cheap store owners who don't like being told they have to spend money to replace them. Most retailers have been dragging their feet, not wanting to make an expensive change. But the new members of the breach-of-the-month club are mad about the insecure systems they've been forced to use, and are now championing the rapid switch to EMV instead of fighting it. The smaller retailers are also impacted now, and are no longer resisting.

The irony is that EMV readers for the small retailers are far, far cheaper than the old terminals, and the rates for using new companies like Square, Intuit, and PayPal are much lower than the typical old bank rates for the old credit card readers.

Slashdot Top Deals

The rule on staying alive as a forecaster is to give 'em a number or give 'em a date, but never give 'em both at once. -- Jane Bryant Quinn

Working...